• Faster Ransomware Detection

    Ransomware extortion is hugely expensive, and instances of ransomware extortion are on the rise. The FBI reports receiving 3,729 ransomware complaints in 2021, with costs of more than $49 million. What’s more, 649 of those complaints were from organizations classified as critical infrastructure.

  • New Method Kills Cyberattacks in Less Than a Second

    Researchers, using artificial intelligence, new method that could automatically detect and kill cyberattacks on our laptops, computers and smart devices in under a second.

  • How Destructive Is a DDoS Cyberattack?

    Last weekend, Russian hackers attacked several German government websites. These cyberattacks were seemingly harmless, much to the relief of the authorities. But many others are not so lucky.

  • Undetected and Dormant: Managing Australia’s Software Security Threat

    At the same time as software has become integral to our prosperity and national security, attacks on software supply chains are on the rise. Software supply chain attacks are popular, can have a big impact and are used to great effect by a range of cyber adversaries.

  • Cybersecurity Guidance for Supply Chain Risk Management

    A new update to the NIST’s cybersecurity supply chain risk management (C-SCRM) guidance aims to help organizations protect themselves as they acquire and use technology products and services.

  • Russia’s Hybrid War in Ukraine

    Microsoft last week released a report which details a broad cyberattacks campaign by Russia in Ukraine, a campaign conducted in concert with kinetic military action. At least six Russian Advanced Persistent Threat (APT) actors and other unattributed threats, have conducted destructive attacks, espionage operations, or both, while Russian military forces attack the country by land, air, and sea.

  • A Cyber Security Intrusion Detection System for Industrial Control Systems

    Researchers have developed technology to help government and industry detect cyber threats to industrial networks used in critical infrastructure and manufacturing systems.

  • New Tool in the Fight Against Hackers

    A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians have solved a mathematical riddle that allows for a person’s geographical location to be used as a personal ID that is secure against even the most advanced cyberattacks.

  • AI, Machine Learning to Help Defend Against Cyberattacks

    Two new tools are helping cybersecurity professionals fight the vast volume of threats and attacks— artificial intelligence (AI) and machine learning. AI and machine learning can detect novel malicious code, catch fraudulent charges on a credit card or fraudulent network login attempts, block phishing messages on an email service and assist companies with cloud management in spotting anomalies that traditional cyber defense technologies may not pick up.

  • Illinois Tech's CyberHawks Win National Cybersecurity Championship

    A team of students from Illinois Institute of Technology’s cybersecurity student organization CyberHawks won the National Centers of Academic Excellence in Cybersecurity Cyber Games National Championship last week. Sixty-five teams from 55 colleges competed in the competition overall.

  • Cloud Server Leasing Can Leave Sensitive Data Up for Grabs

    Renting space and IP addresses on a public server has become standard business practice, but according to computer scientists, current industry practices can lead to “cloud squatting,” which can create a security risk, endangering sensitive customer and organization data intended to remain private. New research provides solutions for companies, cloud-service providers to help minimize security risks.

  • How Ukraine Has Defended Itself Against Cyberattacks – Lessons for the U.S.

    In 2014, as Russia launched a proxy war in Eastern Ukraine and annexed Crimea, and in the years that followed, Russian hackers hammered Ukraine. The cyberattacks went so far as to knock out the power grid in parts of the country in 2015. Russian hackers stepped up their efforts against Ukraine in the run-up to the 2022 invasion, but with notably different results. Those differences hold lessons for U.S. national cyber defense.

  • Identifying Methods to Predict Future Cyberattacks

    “Malware” is a big threat for modern society. In 201, 2.8 billion consumer data records were breached, costing more than $654 billion to U.S. organizations, posing a massive industry threat. The numbers have only increased since then. Researchers are investigating ways to accurately predict these attacks.

  • Ukraine Offers Lessons for Russia’s 2024 Election Interference

    For all the media attention on the domestic political dimensions, the Kremlin’s interference in the 2016 and 2020 presidential elections (and the 2018 midterms) included a significant focus on shaping U.S. policy toward Ukraine. Exerting influence on U.S. Ukraine policy Ukraine has long been a goal of Russian disinformation efforts, so American policymakers must prepare now for this influence effort to reemerge in 2024.

  • Warning: Objects in Driverless Car Sensors May Be Closer Than They Appear

    Researchers have demonstrated the first attack strategy that can fool industry-standard autonomous vehicle sensors into believing nearby objects are closer (or further) than they appear without being detected.